Vulnerability Details CVE-2019-2323
Lack of check to ensure crypto engine data passed by user is initialized can result in bus error in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MSM8909W, MSM8996AU, QCS405, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 636, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM439, SDM630, SDM660, SDX20, SDX24
Exploit prediction scoring system (EPSS) score
EPSS Score 0.003
EPSS Ranking 55.2%
CVSS Severity
CVSS v3 Score 9.8
CVSS v2 Score 10.0
Products affected by CVE-2019-2323
-
cpe:2.3:h:qualcomm:mdm9150:-
-
cpe:2.3:h:qualcomm:mdm9206:-
-
cpe:2.3:h:qualcomm:mdm9607:-
-
cpe:2.3:h:qualcomm:mdm9640:-
-
cpe:2.3:h:qualcomm:mdm9650:-
-
cpe:2.3:h:qualcomm:msm8909w:-
-
cpe:2.3:h:qualcomm:msm8996au:-
-
cpe:2.3:h:qualcomm:qcs405:-
-
cpe:2.3:h:qualcomm:qcs605:-
-
cpe:2.3:h:qualcomm:qualcomm_215:-
-
cpe:2.3:h:qualcomm:sd_205:-
-
cpe:2.3:h:qualcomm:sd_210:-
-
cpe:2.3:h:qualcomm:sd_212:-
-
cpe:2.3:h:qualcomm:sd_425:-
-
cpe:2.3:h:qualcomm:sd_427:-
-
cpe:2.3:h:qualcomm:sd_429:-
-
cpe:2.3:h:qualcomm:sd_430:-
-
cpe:2.3:h:qualcomm:sd_435:-
-
cpe:2.3:h:qualcomm:sd_439:-
-
cpe:2.3:h:qualcomm:sd_450:-
-
cpe:2.3:h:qualcomm:sd_625:-
-
cpe:2.3:h:qualcomm:sd_632:-
-
cpe:2.3:h:qualcomm:sd_636:-
-
cpe:2.3:h:qualcomm:sd_665:-
-
cpe:2.3:h:qualcomm:sd_670:-
-
cpe:2.3:h:qualcomm:sd_675:-
-
cpe:2.3:h:qualcomm:sd_710:-
-
cpe:2.3:h:qualcomm:sd_712:-
-
cpe:2.3:h:qualcomm:sd_730:-
-
cpe:2.3:h:qualcomm:sd_820:-
-
cpe:2.3:h:qualcomm:sd_820a:-
-
cpe:2.3:h:qualcomm:sd_835:-
-
cpe:2.3:h:qualcomm:sd_845:-
-
cpe:2.3:h:qualcomm:sd_850:-
-
cpe:2.3:h:qualcomm:sd_855:-
-
cpe:2.3:h:qualcomm:sda660:-
-
cpe:2.3:h:qualcomm:sdm439:-
-
cpe:2.3:h:qualcomm:sdm630:-
-
cpe:2.3:h:qualcomm:sdm660:-
-
cpe:2.3:h:qualcomm:sdx20:-
-
cpe:2.3:h:qualcomm:sdx24:-
-
cpe:2.3:o:qualcomm:mdm9150_firmware:-
-
cpe:2.3:o:qualcomm:mdm9206_firmware:-
-
cpe:2.3:o:qualcomm:mdm9607_firmware:-
-
cpe:2.3:o:qualcomm:mdm9640_firmware:-
-
cpe:2.3:o:qualcomm:mdm9650_firmware:-
-
cpe:2.3:o:qualcomm:msm8909w_firmware:-
-
cpe:2.3:o:qualcomm:msm8996au_firmware:-
-
cpe:2.3:o:qualcomm:qcs405_firmware:-
-
cpe:2.3:o:qualcomm:qcs605_firmware:-
-
cpe:2.3:o:qualcomm:qualcomm_215_firmware:-
-
cpe:2.3:o:qualcomm:sd_205_firmware:-
-
cpe:2.3:o:qualcomm:sd_210_firmware:-
-
cpe:2.3:o:qualcomm:sd_212_firmware:-
-
cpe:2.3:o:qualcomm:sd_425_firmware:-
-
cpe:2.3:o:qualcomm:sd_427_firmware:-
-
cpe:2.3:o:qualcomm:sd_429_firmware:-
-
cpe:2.3:o:qualcomm:sd_430_firmware:-
-
cpe:2.3:o:qualcomm:sd_435_firmware:-
-
cpe:2.3:o:qualcomm:sd_439_firmware:-
-
cpe:2.3:o:qualcomm:sd_450_firmware:-
-
cpe:2.3:o:qualcomm:sd_625_firmware:-
-
cpe:2.3:o:qualcomm:sd_632_firmware:-
-
cpe:2.3:o:qualcomm:sd_636_firmware:-
-
cpe:2.3:o:qualcomm:sd_665_firmware:-
-
cpe:2.3:o:qualcomm:sd_670_firmware:-
-
cpe:2.3:o:qualcomm:sd_675_firmware:-
-
cpe:2.3:o:qualcomm:sd_710_firmware:-
-
cpe:2.3:o:qualcomm:sd_712_firmware:-
-
cpe:2.3:o:qualcomm:sd_730_firmware:-
-
cpe:2.3:o:qualcomm:sd_820_firmware:-
-
cpe:2.3:o:qualcomm:sd_820a_firmware:-
-
cpe:2.3:o:qualcomm:sd_835_firmware:-
-
cpe:2.3:o:qualcomm:sd_845_firmware:-
-
cpe:2.3:o:qualcomm:sd_850_firmware:-
-
cpe:2.3:o:qualcomm:sd_855_firmware:-
-
cpe:2.3:o:qualcomm:sda660_firmware:-
-
cpe:2.3:o:qualcomm:sdm439_firmware:-
-
cpe:2.3:o:qualcomm:sdm630_firmware:-
-
cpe:2.3:o:qualcomm:sdm660_firmware:-
-
cpe:2.3:o:qualcomm:sdx20_firmware:-
-
cpe:2.3:o:qualcomm:sdx24_firmware:-